Hidden voice commands N Carlini, P Mishra, T Vaidya, Y Zhang, M Sherr, C Shields, D Wagner, ... 25th {USENIX} Security Symposium ({USENIX} Security 16), 513-530, 2016 | 797 | 2016 |
Efficient querying and maintenance of network provenance at internet-scale W Zhou, M Sherr, T Tao, X Li, BT Loo, Y Mao Proceedings of the 2010 ACM SIGMOD International Conference on Management of …, 2010 | 211 | 2010 |
Secure network provenance W Zhou, Q Fei, A Narayan, A Haeberlen, BT Loo, M Sherr Proceedings of the Twenty-Third ACM Symposium on Operating Systems …, 2011 | 180 | 2011 |
Datalog and Recursive Query Processing. TJ Green, SS Huang, BT Loo, W Zhou Foundations and Trends in Databases 5 (2), 105-195, 2013 | 116 | 2013 |
Let SDN be your eyes: Secure forensics in data center networks A Bates, K Butler, A Haeberlen, M Sherr, W Zhou Proceedings of the NDSS Workshop on Security of Emerging Network …, 2014 | 103 | 2014 |
Diagnosing missing events in distributed systems with negative provenance Y Wu, M Zhao, A Haeberlen, W Zhou, BT Loo Proceedings of the 2014 ACM conference on SIGCOMM, 383-394, 2014 | 99 | 2014 |
The good, the bad, and the differences: Better network diagnostics with differential provenance A Chen, Y Wu, A Haeberlen, W Zhou, BT Loo Proceedings of the 2016 ACM SIGCOMM Conference, 115-128, 2016 | 88 | 2016 |
Distributed time-aware provenance W Zhou, S Mapara, Y Ren, Y Li, A Haeberlen, Z Ives, BT Loo, M Sherr Proceedings of the VLDB Endowment 6 (2), 49-60, 2012 | 65 | 2012 |
Detecting covert timing channels with time-deterministic replay A Chen, WB Moore, H Xiao, A Haeberlen, LTX Phan, M Sherr, W Zhou USENIX Symposium on Operating System Design and Implementation (OSDI), 2014 | 64 | 2014 |
Veridb: An sgx-based verifiable database W Zhou, Y Cai, Y Peng, S Wang, K Ma, F Li Proceedings of the 2021 International Conference on Management of Data, 2182 …, 2021 | 60 | 2021 |
Cloud-edge topologies B Chandramouli, SK Nath, W Zhou US Patent 9,098,344, 2015 | 57 | 2015 |
Private and verifiable interdomain routing decisions M Zhao, W Zhou, AJT Gurney, A Haeberlen, M Sherr, BT Loo Proceedings of the ACM SIGCOMM 2012 conference on Applications, technologies …, 2012 | 55 | 2012 |
FSR: Formal analysis and implementation toolkit for safe interdomain routing A Wang, L Jia, W Zhou, Y Ren, BT Loo, J Rexford, V Nigam, A Scedrov, ... IEEE/ACM Transactions on Networking 20 (6), 1814-1827, 2012 | 54 | 2012 |
DMaC: Distributed Monitoring and Checking W Zhou, O Sokolsky, BT Loo, I Lee International Workshop on Runtime Verification, 184-201, 2009 | 53 | 2009 |
Automated bug removal for software-defined networks Y Wu, A Chen, A Haeberlen, W Zhou, BT Loo 14th {USENIX} Symposium on Networked Systems Design and Implementation …, 2017 | 49 | 2017 |
Recursive computation of regions and connectivity in networks M Liu, NE Taylor, W Zhou, ZG Ives, BT Loo 2009 IEEE 25th International Conference on Data Engineering, 1108-1119, 2009 | 47 | 2009 |
Towards a data-centric view of cloud security W Zhou, M Sherr, WR Marczak, Z Zhang, T Tao, BT Loo, I Lee Proceedings of the second international workshop on Cloud data management, 25-32, 2010 | 43 | 2010 |
Unified declarative platform for secure netwoked information systems W Zhou, Y Mao, BT Loo, M Abadi 2009 IEEE 25th International Conference on Data Engineering, 150-161, 2009 | 43 | 2009 |
Ał: An Extensible Platform for Application-Aware Anonymity M Sherr, A Mao, WR Marczak, W Zhou, BT Loo, MA Blaze | 41 | 2010 |
Provenance-aware secure networks W Zhou, E Cronin, BT Loo Data Engineering Workshop, 2008. ICDEW 2008. IEEE 24th International …, 2008 | 34 | 2008 |